Authors :
Alexander T. Gendoma
Volume/Issue :
Volume 10 - 2025, Issue 12 - December
Google Scholar :
https://tinyurl.com/3r9jbzzv
Scribd :
https://tinyurl.com/4xwkc9z3
DOI :
https://doi.org/10.38124/ijisrt/25dec461
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Various challenges have been identified when it comes to the physical security practices being implemented in the
area. In terms of access control, the main issue comes in dealing the people, including employees, who are trying to access
important systems or information without permission. On the other hand, when it comes to security assessment, the main
problem is keeping up with online threats that constantly change from time to time.
This study evaluates physical security practices, focusing on access control, security assessment, and surveillance, to
determine their effectiveness in ensuring safety. The findings reveal high overall satisfaction with security measures, scoring
an average, particularly for identification protocols and ID management. Security assessment practices also received a lower
rating of underscoring the need for enhancement.
The demographic profile of respondents shows a predominantly young workforce, with most aged 25-34 and a balanced
gender distribution. The majority of respondents have significant work experience, while educational levels vary, with a
notable proportion having some college education. This suggests a generally experienced and diverse workforce.
Clients report high satisfaction with security measures, especially advanced locks, effective lighting, and video
surveillance. Nevertheless, improvements are needed in entrance point security and perimeter surveillance. The study finds
no significant impact of age, gender, length of service, or education on security practices, indicating uniform training and
organizational culture as evidenced by the non-significant differences.
To address the identified issues, an action plan is developed based on best practices. This plan includes
recommendations for enhancing training programs, upgrading access control systems, implementing regular security
audits, and improving communication channels for feedback. This structured approach aims to refine security practices and
ensure continuous improvement in response to evolving security challenges.
Lastly, for the surveillance and monitoring aspects, maintaining protection and privacy is still one of the main concerns
as it involves protecting everyone’s privacy. Adopting a comprehensive security approach is recommended based on the
indicated issues in physical security practice.
Keywords :
Client Satisfaction, Physical Security, Model of Best Practice.
References :
- AlertMedia (2023). Conduct a Physical Security Assessment in 5 Steps. https://www.alertmedia.com/blog/physical-security-assessment/
- Al Fedaghi, S. & Alsumait, O. (2019). Towards a conceptual foundation for physical security: case study of an IT department. International Journal of Safety and Security Engineering, 9(2), 137 – 156. doi: 10.2495/SAFE-V9-N2-137-156
- Aydinan, J. J. B. (2023). Higher Education Institutions Security Capability the Leads to the Creation of Standardized Campus Security System. Journal for Educators, Teachers, and Trainers, 14(2), 356-369.
- Britannica, T. Editors of Encyclopaedia (2023). Subic Bay. Encyclopedia Britannica. https://www.britannica.com/place/Subic-Bay
- Brooks, D. J. (2022). Intrusion Detection Systems in Physical Security. The Handbook of Security, 681 – 703. https://doi.org/10.1007/978-3-030-91735-7_32
- Burton, F. (2021). Physical Security Threats and Office Reopenings: Four Issues Every CEO Needs To Plan For Now. Forbes. https://www.forbes.com/sites/forbestechcouncil/2021/07/14/physical-security-threats-and-office-reopenings-four-issues-every-ceo-needs-to-plan-for-now/?sh=4e85343d6069
- Cobb, M. (2021, April 13). Physical Security. TechTarget. https://www.techtarget.com/searchsecurity/definition/physical-security
- Coole, M. P. & Brooks, D. J. (2019). Physical Security: Best Practices. Encyclopedia of Security and Emergency Management, 1 – 9. https://doi.org/10.1007/978-3-319-69891-5_220-1
- CorpSecurity Team (2021). How Important are Security Guards? https://corpsecurity.org/how-important-are-security-guards/
- De La Cruz, C. I. (2021). The Philippines Has Been Named Least Safe Country in the World. Spot. Ph. https://www.spot.ph/newsfeatures/the-latest-news-features/86730/philippines-safety-index-last-world-safest-countries-a833-20210708
- Deloitte (2022). Physical Security: The Shift in Perspective. https://www.deloitte.com/global/en/services/risk-advisory/blogs/physical-security-the-shift-in-perspective.html
- DotNek (2022). What are the three important components of physical security? https://www.dotnek.com/Blog/Security/what-are-the-three-important-components-of-physical-security
- DMAC Security (2021). 10 Physical Security Measures Every Organization Should Take. https://dmacstrategic.com/10-physical-security-measures-every-organization-should-take
- DSC (2019, December 13). Corporate Physical Security Best Practices. https://www.thinkdsc.com/blog/corporate-physical-security-best-practices
- EC-Council (2022). What is Incident Management and What Are Its Advantages? https://www.eccouncil.org/cybersecurity-exchange/incident-handling/what-is-incident-management-response/
- Egnyte (2021). Unauthorized Access: Prevention Best Practices. https://www.egnyte.com/guides/governance/unauthorized-access
- ELID Technology Intl. Inc. (2018). Reasons Why Businesses Should Invest in Security Systems in the Philippines. https://elid.com.ph/security-systems-philippines/
- Fay, J. J., & Patterson, D. (2018). Contemporary Security Management. doi: 10.1016/C2015-0-04732-3
- Federal Trade Commission (n.d). Physical Security. https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/physical-security
- Ferdinando, J. (n.d.). Security is more important than ever. Building Security Services & Systems. https://www.buildingsecurity.com/blog/importance-of-the-security-industry/
- GeeksforGeeks (2020). Introduction to Physical Security. https://www.geeksforgeeks.org/introduction-to-physical-security/
- Gill, M., Howell, C., McGreer, C., & Ramm, J. (2019). The Evolution of Physical Security Measures: assessing the benefits and implications of using more advances technologies. https://perpetuityresearch.com/wp-content/uploads/2019/10/Evolution-of-physical-security-measures-Final-Report-.pdf
- Goulding, C. R. (2021). Physical Security R&D Tax Credits. Journal of Physical Security, Journal of Physical Security, 14(1), 1 – 9. https://rbsekurity.com/JPS%20Archives/JPS_14(1).pdf
- Hamamoto, A. (2022). Social Impacts of Infrastructure Construction: Sociological Approaches to Development. Sustainable Development Disciplines for Humanity, 85 – 98. doi: 10.1007/978-981-19-4859-6 6
- Hutter, D. (2021). Physical security and why it is important. https://sansorg.egnyte.com/dl/MEttXe0pg2
- Hyperproof (2022). Internal Controls and Data Security: How to Develop Controls That Meet Your IT Security Needs. https://hyperproof.io/resource/internal-controls-and-data-security/
- Isnaini, K. & Solikhatin, S. A. (2020). Information security analysis on physical security in university x using maturity model. Jurnal Informatika, 14(2), 76 – 84. doi: 10.26555/jifo.v14i2.a14434
- Kisi. (n.d.). Everything you need to know about physical security. https://www.getkisi.com/overview/physical-security
- Johnston, R.G. (2020). Security assurance. Journal of Physical Security, 13 (1), 2 – 4. https://rbsekurity.com/JPS%20Archives/JPS_13(1).pdf
- Johnston, R.G. (2019). Design Reviews Versus Vulnerability Assessments for Physical Security. Journal of Physical Security, 12 (3), 30 – 32. https://rbsekurity.com/JPS%20Archives/JPS%2012(3).pdf
- Lake, K. (2022). What are the Different Types of Access Control? Jumpcloud. https://jumpcloud.com/blog/different-types-access-control
- LeTellier, V. (2019). How to Use the Attacker Mentality for Good. ASIS. https://www.asisonline.org/security-management-magazine/articles/2019/09/how-to-use-the-attacker-mentality-for-good/
- Litche, D., Witte, D., Termin, T. & Wolf, K.D. (2021). Representing Uncertainty in Physical Security Risk Assessment. European Journal for Security Research, 6, 189 – 209. https://doi.org/10.1007/s41125-021-00075-3
- Lutkevich, B. (2022). access control. TechTarget. https://www.techtarget.com/searchsecurity/definition/access-control
- Mabanglo, J.K.L. (2020). Campus Security Practices” Assessment of Philippine College of Science And Technology. International Journal of Advanced Research and Publications, 4(4), 14 – 19. https://www.researchgate.net/publication/351481393_Campus_Security_Practices_Assessment_Of_Philippine_College_Of_Science_And_Technology
- Maxsenti, M. (2021). What is Physical Security? Overview & How to Reduce Risk. Genea. https://www.getgenea.com/blog/physical-security/
- Miller, B. (2022). 12 Tips for Improving Access Control in Your Organization. Cyber Defense Magazine. https://www.cyberdefensemagazine.com/12-tips-for-improving/
- Milkovski, I. (2021). Physical Security System Components. LinkedIn. https://www.linkedin.com/pulse/physical-security-system-components-igor-milkovski-ma/
- Mishra, A. (2023). Effective Physical Security Protocols 2023. CorpSecurity Team. https://corpsecurity.org/effective-physical-security/
- Morgan, A., & Dowling, C. (2021). Physical Security: Video Surveillance, Equipment, and Training. Encyclopedia of Securiy and Management, 766 – 775. doi: 10.1007/978-3-319-70488-3_222
- National Center for Education Statistics. (n.d). Chapter 5-protecting your system: physical security, from safeguarding your technology”. NCES publication, 98-297 https://nces.ed.gov/pubs98/safetech/chapter5.asp
- National Protective Security Authority (2023). Intrusion Detection. https://www.cpni.gov.uk/intrusion-detection
- Neumetric (2022). What are Security Assessments? https://www.neumetric.com/security-assessment/
- Nikolopoulou, K. (2022, August 09). What is Convenience Sampling? Definition & Examples. Scribbr. https://www.scribbr.com/methodology/convenience-sampling/#:~:text=Convenience%20sampling%20is%20a%20non,to%20participate%20in%20the%20research.
- Nizhebetskyi, D. (2023). Risk Identification (What is it, techniques and examples). IT PM School. https://itpmschool.com/risk-identification/
- Panigrahi, R., Borah, S., Bhoi, A. K., & Mallick, P. K. (2020). Intrusion Detection Systems (IDS) – An Overview with a Generalized Framework. Cognitive Informatics and Soft Computing, 107 – 117. doi: 10.1007/978-981-15-1451-7_11
- P&L Law (2018). Security Measures for Protection of Personal Data (Rule VI): Data Privacy Act. https://pnl-law.com/blog/security-measures-for-protection-of-personal-data-rule-vi-data-privacy-act/
- Proag, V. (2020). Economic and Social Aspects of Infrastructure. Infrastructure Planning and Management: An Integrated Approach, 185 – 218. doi: 10.1007/978-3-030-48559-7_7
- Protective Security Requirements [PSR] (2018). Deter, Detect, Delay, Respond, Recover. https://www.protectivesecurity.govt.nz/physical-security/lifecycle/design/apply-good-practices/deter-detect-delay-respond-recover/
- Protective Security Requirements [PSR] (2022, May 01). Alarm systems. https://www.protectivesecurity.govt.nz/physical-security/lifecycle/design/specific-security-measures/alarm-systems/
- Ralph (2021). What is Physical Security? Definition and Concepts. United Locksmith. https://unitedlocksmith.net/blog/what-is-physical-security-definition-and-concepts
- Resolver (2018). Physical and Cybersecurity Defense: how Hybrid Attacks are Raising the Stakes. https://www.resolver.com/blog/physical-and-cybersecurity-defense-hybrid-attacks/
- RiskOptics (2023). What are the 3 Types of Internal Controls? https://reciprocity.com/resources/what-are-the-3-types-of-internal-controls/
- Sanghavi, A. (2022). Physical Security: What It is and Why You Should Care. https://www.g2.com/articles/physical-security
- Security (2022). Physical security incidents increase during the pandemic. https://www.securitymagazine.com/articles/97021-physical-security-incidents-increase-during-the-pandemic
- Security Hire Melbourne (2023). The importance of security guards in today’s society. Medium. https://medium.com/@stevesec.hire/the-importance-of-security-guards-in-todays-society-2ba5d67f66d1
- Security Training (2023). How do you conduct a physical security risk assessment for your facility? LinkedIn. https://www.linkedin.com/advice/0/how-do-you-conduct-physical-security-risk-assessment#:~:text=A%20physical%20security%20risk%20assessment%20is%20a%20systematic,measures%20to%20protect%20your%20people%2C%20property%2C%20and%20information.
- Shaikh, H. (2018). The importance of physical security in the workplace. Infosec. https://resources.infosecinstitute.com/topic/importance-physical-security-workplace/
- Sharma, K. (2023). Intrusion Detection System (IDS): Types, techniques, and Applications. Knowledge Hut. https://www.knowledgehut.com/blog/security/intrusion-detection-system
- Sirisilla, S. (2023). Qualitative Vs. Quantitative Research – A step-wise guide to conduct research. Enago Academy. https://www.enago.com/academy/qualitative-vs-quantitative-research/
- Sprout Solutions (2018). The Data Privacy Act (RA 10173): Here’s What You Need to Know. https://sprout.ph/blog/data-privacy-act/
- Steiner, E.D., Philips, A. Moore, P., Jackson, B., & Augustine C. (2021). Challenges in implementing physical security measures in K-12 schools. https://www.rand.org/pubs/research_reports/RRA1077-2.html
- Swinhoe, D. (2021, August 4). What is physical security? How to keep your facilities and devices safe from on-site attackers. CSO. https://www.csoonline.com/article/3324614/what-is-physical-security-how-to-keep-your-facilities-and-devices-safe-from-on-site-attackers.html
- Thangavelu, M., Krishnaswamy, V., & Sharma, M. (2021). Impact of comprehensive information security awareness and cognitive characteristics on security incident management – an empirical study. Computers & Security, 109, 102401. doi: 10.1016/j.cose.2021.102401
- The Indeed Editorial Team (2021). 16 process metrics to track | indeed.com. https://www.indeed.com/career-advice/careerdevelopment/process-metrics
- Tunggal, A. T. (2023). What is a Vulnerability Assessment? And How to Conduct One. UpGuard. https://www.upguard.com/blog/vulnerability-assessment
- Unisys (2019). The Philippines shows the highest level of concern over security issues; one in five Filipinos have stopped dealing with an organization after a data breach-new Unisys security index. https://www.unisys.com/news-release/ph-the-philippines-shows-the-highest-level-of-concern/
- United Nations. (n.d.). The Philippines at a glance. un.int/philippines/philippines/philippines-glance#:~:text=The%20Philippines%20is%20located%20in,port%20of%20entry%20is%20Manila.
- Urhuogo-Idierukevbe, I., Addo, A., Anderson, T. L., & Khan, F. M. (2019). Physical security best practices. Journal of Physical Security, 12(3), 15 – 29. https://rbsekurity.com/JPS%20Archives/JPS%2012(3).pdf
- Villanueva, M. S. (2022). Security Incident or Data Breach: What’s the Difference? Intelligent Technical Solutions. https://www.itsasap.com/blog/security-incident-vs-breach
- WheelhouseIT (2022, August 8). The importance of physical security. https://www.wheelhouseit.com/the-importance-of-physical-security/
- Woods, M. (2019). Practical tools for the identification of risk (and opportunity). IIRSM. https://www.iirsm.org/news/practical-tools-identification-risk-and-opportunity
- Zulueta, M. (2019). The Philippines is named the world’s most dangerous country…but is it really? When in Manila. https://www.wheninmanila.com/the-philippines-is-named-the-worlds-most-dangerous-country-but-is-it-really/
Various challenges have been identified when it comes to the physical security practices being implemented in the
area. In terms of access control, the main issue comes in dealing the people, including employees, who are trying to access
important systems or information without permission. On the other hand, when it comes to security assessment, the main
problem is keeping up with online threats that constantly change from time to time.
This study evaluates physical security practices, focusing on access control, security assessment, and surveillance, to
determine their effectiveness in ensuring safety. The findings reveal high overall satisfaction with security measures, scoring
an average, particularly for identification protocols and ID management. Security assessment practices also received a lower
rating of underscoring the need for enhancement.
The demographic profile of respondents shows a predominantly young workforce, with most aged 25-34 and a balanced
gender distribution. The majority of respondents have significant work experience, while educational levels vary, with a
notable proportion having some college education. This suggests a generally experienced and diverse workforce.
Clients report high satisfaction with security measures, especially advanced locks, effective lighting, and video
surveillance. Nevertheless, improvements are needed in entrance point security and perimeter surveillance. The study finds
no significant impact of age, gender, length of service, or education on security practices, indicating uniform training and
organizational culture as evidenced by the non-significant differences.
To address the identified issues, an action plan is developed based on best practices. This plan includes
recommendations for enhancing training programs, upgrading access control systems, implementing regular security
audits, and improving communication channels for feedback. This structured approach aims to refine security practices and
ensure continuous improvement in response to evolving security challenges.
Lastly, for the surveillance and monitoring aspects, maintaining protection and privacy is still one of the main concerns
as it involves protecting everyone’s privacy. Adopting a comprehensive security approach is recommended based on the
indicated issues in physical security practice.
Keywords :
Client Satisfaction, Physical Security, Model of Best Practice.